The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
This paper presents processing and visualization techniques for Diffusion Tensor Magnetic Resonance Imaging (DT-MRI). In DT-MRI, each voxel is assigned a tensor that describes loc...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
What is the career path for a performance analyst? A capacity planner? Most technicians paid their dues in the trenches of systems programming or operations. Having done it all, t...